frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Synadia and TigerBeetle Commit $512k USD to the Zig Software Foundation

https://www.synadia.com/blog/synadia-tigerbeetle-zig-foundation-pledge
345•derekcollison•5h ago•98 comments

Libera Chat receives legal advice that the Online Safety Act does not apply to

https://libera.chat/news/advised
77•todsacerdoti•1h ago•15 comments

Rock Tumbler Instructions: Turning Rough Rocks into Beautiful Tumbled Stones

https://rocktumbler.com/tips/rock-tumbler-instructions/
71•debo_•2h ago•30 comments

Making a micro Linux distro (2023)

https://popovicu.com/posts/making-a-micro-linux-distro/
108•turrini•5h ago•21 comments

The future of Python web services looks GIL-free

https://blog.baro.dev/p/the-future-of-python-web-services-looks-gil-free
127•gi0baro-dev•6d ago•38 comments

Jacqueline – A minimal i386 kernel written in Pascal

https://github.com/danirod/jacqueline
26•peter_d_sherman•3d ago•2 comments

Unlocking free WiFi on British Airways

https://www.saxrag.com/tech/reversing/2025/06/01/BAWiFi.html
501•vinhnx•1d ago•120 comments

The Swift SDK for Android

https://www.swift.org/blog/nightly-swift-sdk-for-android/
637•gok•22h ago•251 comments

Magic sizes enable high-fidelity assembly of programmable shells

https://arxiv.org/abs/2411.03720
17•PaulHoule•3d ago•1 comments

People with blindness can read again after retinal implant and special glasses

https://www.nbcnews.com/health/health-news/tiny-eye-implant-special-glasses-legally-blind-patient...
255•8bitsrule•4d ago•74 comments

React vs. Backbone in 2025

https://backbonenotbad.hyperclay.com/
243•mjsu•9h ago•186 comments

Valetudo: Cloud replacement for vacuum robots enabling local-only operation

https://valetudo.cloud/
364•freetonik•5d ago•157 comments

Key IOCs for Pegasus and Predator Spyware Removed with iOS 26 Update

https://iverify.io/blog/key-iocs-for-pegasus-and-predator-spyware-cleaned-with-ios-26-update
181•transpute•16h ago•114 comments

Against SQL

https://www.scattered-thoughts.net/writing/against-sql/
12•charles_irl•3h ago•2 comments

Calculating the Bounding Rectangle of a Circular Sector

https://asawicki.info/news_1791_calculating_the_bounding_rectangle_of_a_circular_sector
7•ibobev•5d ago•0 comments

First convex polyhedron found that can't pass through itself

https://www.quantamagazine.org/first-shape-found-that-cant-pass-through-itself-20251024/
506•fleahunter•1d ago•143 comments

Study: MRI contrast agent causes harmful metal buildup in some patients

https://www.ormanager.com/briefs/study-mri-contrast-agent-causes-harmful-metal-buildup-in-some-pa...
215•nikolay•21h ago•189 comments

The State of Machine Learning Frameworks in 2019

https://thegradient.pub/state-of-ml-frameworks-2019-pytorch-dominates-research-tensorflow-dominat...
25•jxmorris12•4d ago•15 comments

Harnessing America's heat pump moment

https://www.heatpumped.org/p/harnessing-america-s-heat-pump-moment
210•ssuds•22h ago•469 comments

What is intelligence? (2024)

https://whatisintelligence.antikythera.org/
148•sva_•17h ago•97 comments

I invited strangers to message me through a receipt printer

https://aschmelyun.com/blog/i-invited-strangers-to-message-me-through-a-receipt-printer/
277•chrisdemarco•6d ago•103 comments

Context engineering is sleeping on the humble hyperlink

https://mbleigh.dev/posts/context-engineering-with-links/
156•mbleigh•2d ago•62 comments

Public Montessori programs strengthen learning outcomes at lower costs: study

https://phys.org/news/2025-10-national-montessori-early-outcomes-sharply.html
350•strict9•2d ago•214 comments

Code like a surgeon

https://www.geoffreylitt.com/2025/10/24/code-like-a-surgeon
239•simonw•1d ago•118 comments

The geometry of mathematical methods

https://books.physics.oregonstate.edu/GMM/book.html
62•kalind•5d ago•3 comments

Twake Drive – An open-source alternative to Google Drive

https://github.com/linagora/twake-drive
348•javatuts•1d ago•204 comments

Diamond Thermal Conductivity: A New Era in Chip Cooling

https://spectrum.ieee.org/diamond-thermal-conductivity
55•rbanffy•5d ago•24 comments

Luau's performance

https://luau.org/performance
65•todsacerdoti•2d ago•10 comments

Meet the real screen addicts: the elderly

https://www.economist.com/international/2025/10/23/meet-the-real-screen-addicts-the-elderly
267•johntfella•14h ago•290 comments

The persistence of tradition: the curious case of Henry Symeonis (2023)

https://blogs.bodleian.ox.ac.uk/archivesandmanuscripts/2023/12/13/the-persistence-of-tradition-th...
29•georgecmu•3d ago•1 comments
Open in hackernews

That Time Ken Thompson Wrote a Backdoor into the C Compiler

https://micahkepe.com/blog/thompson-trojan-horse/
77•thunderbong•11h ago

Comments

fjfaase•10h ago
Interesting. I reviewd the live-bootstrap project (a project to build a trusted C compiler for building Linux) in the past years, including writing a Linux on i368 simulator/interpreter, and gave a presentation about this at WHY2025.
turtleyacht•9h ago
Assigning 11 to mean "v" in the sequence "\v" sounds like replacing words (or letters) with numbers.

Is that related to Godel's idea that a system can be either complete or inconsistent?

Digit-Al•8h ago
"\v" is an ASCII control character, and means "vertical tab" (VT). In ASCII it is code 11, which is why they are inserting the number 11.
turtleyacht•8h ago
Yes. In this case, it represents "teaching" the compiler something it didn't previously "know" about. But wanted to connect that to whether the computed output of a language could ever be falsifiable, i.e. we would not know it happened.
tetris11•7h ago
Ken Thompson's Reflections on Trusting Trust[0] was one of the motivations for Guix's single 357-byte seed (+libguile) full bootstrap[1].

0: https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_Ref...

1: https://guix.gnu.org/en/blog/2023/the-full-source-bootstrap-...

fjfaase•6h ago
For the 'full' graph for stage0 see: https://fransfaase.github.io/Emulator/tdiagram.html and note that it even is not completely 'full' leaving out some steps that copy file from one location to another. Use mouse or fingers to zoom and pan.

I gave a talk about this at WHY2025 which also refers to this 'Reflections on Trusting Trust' paper. On YouTube https://www.youtube.com/watch?v=akzyyO5wvm0

tetris11•29m ago
nice work!

kaem is a new one for me, what's its connection to mescc?

donatj•7h ago
Hmm... I've read about "Reflections on Trusting Trust" a couple times including in college some twenty years ago, though never the paper itself.

I have never seen the actual examples before, but the way it's always been described to me I kind of expected more...

It was always described as completely undetectable... so my assumption was one could not find it even with a decompiler and a lot of free time...

I guess I expected for instance it to filter patterns of itself out of fread for instance, such that a system built with it literally could not detect its existence at all. I expected it to make the operating system at large lie to you.

fjfaase•6h ago
One can find it out with a decompiler and a lots and lots of free time. Compilers are not trivial programs, especially the ones needed to compile operating systems, with the required optimizations, and there are many ways to obfuscate code.

A better approach is to start with a small executable, one that translate hexadecimal numbers to binary, and from that build all the tools to compile a simple C compiler (such as the Tiny C Compiler, which is not very tiny), to compile the optimizing C compiler that can compile operating systems. That is the approach followed by the live-bootstrap project.

colejohnson66•4h ago
That’s what Guix did. All the way back to a 357 byte assembly code blob that turns a hex file into a binary file, and can “compile” itself.
richardhenry•3h ago
If the compromised compiler also compiles the decompiler…